CEH v11: XSS, Web Shells, APIs & Webhooks

Ethical Hacker v11    |    Intermediate
  • 3 videos | 1h
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 13 users Rating 4.8 of 13 users (13)
Common attack vectors such as cross-site scripting are becoming more difficult to exploit due to the implementation of defenses. In this course, you'll examine how to evade input filters to gain XSS execution. Next, you'll explore web shells, including how they can be deployed, defenses, and evasions. Many of today's web applications utilize an Application Programming Interface to facilitate interaction between clients and services. To wrap up this course, you'll learn about attributes of APIs, how they compare with webhooks, and common vulnerabilities and security countermeasures associated with both APIs and webhooks. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Describe techniques used to evade input filters to gain cross-site scripting (xss) execution
    recognize techniques used to evade input filters to gain cross-site scripting (xss) execution
    identify evasion techniques used to evade input filters
    Describe web shells
    recognize how to deploy web shells
  • identify defenses that can be used to prevent web shells from being uploaded
    Identify the steps to the api hacking methodology
    describe common api vulnerabilities
    recognize the features of webhooks
    recognize the attributes of apis

IN THIS COURSE

  • Locked
    1.  Cross-site Scripting Filtering Evasion
    20m 32s
    After completing this video, you will be able to describe techniques used to evade input filters and gain cross-site scripting (XSS) execution. FREE ACCESS
  • Locked
    2.  Web Shell Backdoors
    17m 23s
    During this video, you will learn how to identify defenses that can be used to prevent web shells from being uploaded. FREE ACCESS
  • Locked
    3.  APIs and Webhooks
    22m 6s
    In this video, find out how to identify the steps of the API Hacking Methodology. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 1111 users Rating 4.6 of 1111 users (1111)
Rating 4.6 of 35 users Rating 4.6 of 35 users (35)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 19 users Rating 4.4 of 19 users (19)
Rating 4.8 of 14 users Rating 4.8 of 14 users (14)
Rating 4.0 of 14 users Rating 4.0 of 14 users (14)